SYSTEM AND METHOD FOR PROVIDING ACCESS TO A NETWORK
A method provides access to, and time for, using a network associated with a commercial establishment through a proxy server. The method enables access to the proxy server within a selected physical area adjacent to the commercial establishment; establishing data communication between a cash register within the commercial establishment and the proxy server; and enabling network access for a given time duration related to a commercial transaction between the customer and the commercial establishment. The transaction my include trade dealing in cash, airline miles or other point based system, certificates, coupons and any other trade related instrument.
This disclosure relates generally to methods and systems for gaining access to networks such as the Internet and other wide area networks (WANs), and more particularly to methods and systems for gaining access to networks within a local area made available by a commercial establishment within a local area.
Network users access so called wide area networks, such as the Internet, using different methods. The term “network” is used herein to refer to any local or wide area network; the Internet, intranets, and so on. Most users access a network by obtaining an account with an Internet service provider (ISP). In this case users are generally provided with a user name and password. Each time such a user accesses the network, his user name and password is provided to the ISP to validate the user. Typically, the user name and password is communicated in the background and the user never sees the transmission. Users also gain access to a network at their place of employment by logging on to a company intranet. In both of these cases network access is controlled.
There are times where a user would like access to a network when not at home and not at work. In this case users generally must access the network in a public venue such as a hotel room, airport, coffee shop, designated public area, trade show, or any other venue that may offer network access. In these situations the user typically does not have an account with which to access the network. In some instances a venue offers network access without charge by simply making the network signals available to anyone without requiring a username and password. However, more often than not a service provider controls network access at a public venue. For instance, T-mobile and Boingo are examples of companies that control many “Hot Spots,” or areas that have Wi-Fi® access. In such instances, if a user is a member of the T-mobile network, for example, then the user can access the network with a T-mobile user name and password. If a user is not a member, then the user can subscribe or purchase a one time usage. In these cases the relationship is between the user and the access point provider or service provider.
Unfortunately, the venue owner may be unable to exercise control, if desired, over network access in such instances.
BRIEF SUMMARY OF THE INVENTIONIn one aspect the invention provides a method which gives venue operators/owners the ability to control access to a network such as the Internet.
In one aspect the invention provides a method that enables the venue operator to provide complimentary Internet access based on the amount, for example in dollars, of goods or services purchased at the venue.
In one aspect the invention provides a method that enables the venue operator to provide complimentary Internet access based on the amount, for example in dollars, of goods or services purchased at the venue.
In one aspect the invention provides a method including a gift card having a magnetic strip encoded with a purchase credit useable for purchases of goods or services at the venue, and also having an access code (“AC”), which may be printed, for controlled use of the Internet.
In one aspect the invention provides a receipt including an AC, the AC providing usage of the Internet for a time period corresponding to the amount of an associated purchase.
In one aspect the invention provides a time or byte allotment for network access as well as a time period or window for using the allotment.
In one aspect the invention provides an AC on a memory device such as a USB compatible memory key, smart card, or other data storage device.
In one aspect the invention provides an AC with an allotment of network access time determined based on points earned, frequent flyer miles, dollars spent, number of times visiting a store, or any other valuable commodity.
In one aspect the invention provides an AC for a Wi-Fi® phone or dual Cellular/Wi-Fi® phone for access to the network and where the AC is input using the phone's keypad.
In one aspect the invention provides an airline ticketing computer for use in issuing an AC for access to a network from an airline waiting area.
In one aspect the invention provides users with the ability to purchase a time or byte allotment of network access time or use from a kiosk.
Other features and advantages of the present invention will become apparent from the following more detailed description, taken in conjunction with the accompanying drawings, which illustrate, by way of example, the principles of the presently described apparatus and method of its use.
Illustrated in the accompanying drawings are embodiments of the present invention In such drawings:
The above described drawing figures illustrate the described apparatus and its method of use in several preferred embodiments, which are further discussed in detail in the following description. Those having ordinary skill in the art may be able to make alterations and modifications to what is described herein without departing from its spirit and scope. Therefore, it must be understood that what is illustrated is set forth only for the purposes of example and that it should not be taken as a limitation in the scope of the present apparatus and method of use.
DETAILED DESCRIPTION OF THE INVENTIONA location or venue includes a configuration in accordance with aspects of the invention as in
A user device 115 such as a laptop computer, PDA, Wi-Fi® phone, cellular phone, mobile handset, other portable device, or other computer based device is in data communication with an access point 113 via a communications link 119. The access point generally provides access to a network (not shown). The access point uses an access code to permit the user device to access the network.
Thus, for example, after the access point receives the access code from the user device, the access point thereafter allows the user device to access the network. In some embodiments the access point determines if the access code is proper, while in other embodiments another device, such as a device associated with the access point, may perform this function. In general, determining if an access code is proper may simply comprise determining if the access code is in a list of valid access codes, but more generally may include processing using the access code, for example, shared secret processing or other key related processing.
As shown in
Note the user device 115 in many embodiments does not actually have to be located within the physical confines of the venue, rather it may be in the vicinity of the venue or proximity of the venue. Similarly, the access point 113 may be located, in some embodiments, in the vicinity of the venue or proximity of the venue instead of physically within the bounds of the venue.
As mentioned above, the access point 113 provides access to a network. For example, access to the network may be an entry point to a network where the user device 115 or the cash register 111 is able to send and receive data messages to and from another computer or device on the network. The user device 115 data couples, or connects, to the access point 113 for communication. For example, the user device 115 connects to the access point 113 for sending and receiving data messages to and from network components via the access point 113.
Examples of access points are the WCG200, WRT54G, and WAP546 by Linksys (www.linksys.com). In some embodiments, the access point has additional features. Firstly, the access point 113 may have the capability to determine access codes (ACs). In one embodiment, determining the AC comprises computing the AC. In an alternative embodiment, determining an AC comprises generating the AC. In another alternative embodiment, determining an AC involves a query to a RADIUS server or database. Secondly, the access point 113 in one embodiment contains a database used to store the access code, and possibly information associated with the access code, such as access allotment, or other information.
The cash register 111 is used for commercial transactions. The cash register 111 may also be connected to the access point 113. For example, the cash register 111 connects to the access point for sending and receiving data messages to and from network components via the access point 113. In most embodiments the cash register is a business machine that usually has a money drawer, indicates the amount of each sale, records the amount of money received, prints a receipt for the transaction, has a processor and memory, and may contain I/O interfaces for connecting peripherals. The I/O interfaces may include VGA, USB, RS-232, RJ-45 for Ethernet, and RS-485, wireless interfaces such as IEEE 802.11, Bluetooth, or any other wireless based interface. Examples of the types of peripherals that might be connected to cash register 111 include but are not limited to credit card swipe, printer, video monitor, payment capture device, wireless interface, optical scanner, and credit card processing terminal. When a peripheral is connected with the cash register 111 then it is considered to be part of the cash register 111. Examples of such cash registers include the IBM SurePOS 700 Series, the NCR RealPOS 80 Point-of-Service Workstation, or the Micros 3700. In other embodiments, the cash register 111 may be a stand alone credit card processing terminal. An example of a credit card processing terminal is the VX 570 offered by VeriFone. The VX 570 may include an Ethernet port for standard TCP/IP communications.
The database may be used to store the AC and information associated with the AC such as an allotment, such as an allotment of time, data, or other quantity, associated with the AC. In one embodiment, the database may be integrated with the access point 113. In this embodiment the access point 113 may communicate the AC to the cash register 111. In an alternative embodiment, the database may be integrated with the cash register 111. In this embodiment the cash register 111 simply provides the AC and additionally may communicate the AC to the access point 113 or other devices or computers on the network. In another alternative embodiment, the database is located external to both the access point 113 and external to the cash register 111, a stand alone database. In this embodiment, the database may communicate the AC to the cash register 111 or other devices or computers on the network. In another embodiment the database may be located partially in the cash register 111 and partially in the access point 113. In this embodiment the access point 113 or the cash register 111 may each communicate the AC or information about the AC to each other or other devices or computers on the network. In another embodiment, the cash register 111 may have a database integrated within it and a database external to the cash register may be available and have duplicate AC code information and duplicate information about the AC. In other embodiments, the database may be a RADIUS server located external to both the cash register 111 and access point 113. In simplest form the AC is available to the cash register 111 and to the access point 113, no database necessary. The database is not depicted in
According to
According to
A commercial transaction comprises a transfer or provision of goods or services in exchange for a payment. The delivery of the goods or services does not necessarily occur when the payment occurs. The delivery of the goods or services independent of the payment may be considered a commercial transaction. The payment whether a good or service is then received is also considered a commercial transaction. In one embodiment a commercial transaction may be a purchase of coffee at a retail establishment. In this example, the payment of money is tendered for a good or service at the time the good is delivered. Other examples of this type of commercial transaction may be the purchase of a car, books, groceries, alcohol, movie ticket, soda from a vending machine, admission to a theme park. In another embodiment a commercial transaction may be a customer purchasing a subscription. In this example, a commercial transaction occurs when the customer purchases the subscription initially as well as each time the subscription is fulfilled. An example of this type of commercial transaction is cable television. Each month the cable customer enters into a commercial transaction by paying for cable service. Additionally, a commercial transaction occurs each time the customer turns on the cable television and watches a program because the cable television company is delivering on the subscription. Similarly, a wireless phone subscriber enters a commercial transaction each month by paying his monthly bill. Additionally, each time the wireless phone subscriber uses the wireless phone a commercial transaction occurs. Another type of commercial transaction may be when payment is not tendered in money but rather in something else that has value such as frequent flyer miles, gift certificates, credits or other value that is non-monetary. For example, a customer of an airline may make payment for network access using an allotment of frequent flyer miles as payment.
The process in block 317 receives the access code. In one embodiment, the cash register 111 receives the access code 317 from the access point 113. In an alternative embodiment, the cash register 111 determines the AC without input from the access point 113. In another alternative embodiment, the access point 113 receives the AC from the database. In another alternative embodiment, the access point receives the AC from the RADIUS server. In another alternative embodiment for block 317, the cash register 111 receives the AC 317 from its own memory. In an alternative embodiment, the cash register 111 computes the AC without the need of input from the access point 113 or the database. In this case, process may skip block 317. In block 319 the process records the access allotment with the access code. In one embodiment, the cash register 111 records in the database the access allotment with the access code 319.
The system shown in
The process elements in
The plurality of user devices 611, 613, 615 may connect to the access point 619 via communications link 629. As discussed previously the user devices 611, 613, 615 can be laptop computers, PDAs, Wi-Fi® phones, cellular phones, mobile handsets, other portable devices, or other computer based devices. Although
The access point 619, similar to the access point 113 in
The proxy server 625 is a computer. The proxy server executes software that allows it to control access to the communications link 633. In most embodiments, the proxy server 625 manages all Internet related communications by monitoring Internet Protocol (“IP”) source and destination addresses, port numbers, and various other information inside standard Ethernet packets. The proxy server 625 uses rules to determine which Ethernet packets are allowed entrance or exit to and from the proxy server 625. Generally, the rules are programmed into software that executes on the proxy server 625 computer. The functions of the proxy server 625 and its make up are generally known to those skilled in the art. In some embodiments the proxy server 625 delivers cached web pages. In alternative embodiments, the proxy server 625 forces a user device to browse a web page so the user may authenticate himself before freely surfing the Internet. The proxy server 625 is optional and in many embodiments is not part of the design. In alternative embodiments, the access point 619 may partially perform proxy server functions. In another alternative embodiment, the access point 619 performs all of the proxy server functions.
The database may be used to store the AC and information about the AC such as the allotment of time associated with the AC. In one embodiment, the database may be integrated with the access point 619. In this embodiment the access point 619 may communicate the AC to the cash register 623. In an alternative embodiment, the database may be integrated with the cash register 623. In this embodiment the cash register 623 simply provides the AC and additionally may communicate the AC to the access point 619 or other devices or computers on the network. In another alternative embodiment, the database is located external to both the access point 619 and external to the cash register 623, a stand alone database. In this embodiment, the database may communicate the AC to the cash register 623 or other devices or computers on the network. In another embodiment the database may be located partially in the cash register 623 and partially in the access point 619. In this embodiment the access point 619 or the cash register 623 may each communicate the AC or information about the AC to each other or other devices or computers on the network. In another embodiment, the cash register 623 may have a database integrated within it and a database external to the cash register may be available and have duplicate AC code information and duplicate information about the AC. In other embodiments, the database may be a RADIUS server located external to both the cash register 623 and access point 619. In other alternative embodiments, the database 617 may be a part of the proxy server 625. In simplest form the AC is available to the cash register 623 and to the access point 619, no database necessary. The database may simply be flat files, may include relational tables such as those depicted in
The cash register 623 is similar to the cash register 111. In some embodiments the cash register 623 may print out a receipt with an AC. An example of such a receipt may be seen in
In most embodiments, communications links 629, 635, 621, and 631 are standard wired or wireless Ethernet communications link. In alternative embodiments, these communications link may be a standard wireless cellular phone connection as is known to those skilled in the art. In other embodiments, these communications links may be an EV-DO, GPRS or other data link across a cellular communications network. Depending on the type of communications links selected, the user devices 611, 613, 615, database 617, access point 619, cash register 623, and proxy server 625 will all have the necessary hardware and software to communicate across the selected type of communications links. In each of the communication link embodiments, described herein there may be switches, routers and hubs, not shown in
In most embodiments, communications link 633 is a standard DSL, Wireless Cable, Cable modem, Optical or T1 link that is capable of transporting standard Ethernet based communications. In alternative embodiments, communications link 633 may be a standard wireless cellular phone connection as is known to those skilled in the art. In other embodiments, communications link 633 may be an EV-DO, GPRS or other data link across a cellular communications network. In each of the communication link embodiments, described herein there may be switches, routers and hubs, not shown in
In most embodiments, the AC may be an alpha-numeric number. This number may simply increment each time an access code is assigned to a transaction. In other embodiments the access code may be a number. This number may simply increment each time an access code is assigned to a transaction. Alternatively, the AC may be a random number or a random alpha-numeric number. The number or alpha-numeric may be generated randomly from a random number generator. In most embodiments the access code is unique to the system that it is being implemented in. Once an AC is recorded in a record such as the record in row 1313, then the AC has been assigned and should not be assigned again at least until the window expires. In an alternative embodiment, the AC can be the transaction ID. In other embodiments, the AC can be an airline record locator number or a frequent flyer number. In other embodiments the AC may be a user name and password.
Column 1317 shows all of the ACs for each of the records in the table. An AC has been described previously. Column 1319 shows all of the Venue IDs for each of the records in the table. A venue ID may be comprised of a number, alpha-numeric number, letter, word, or symbol that uniquely identifies each venue or location. For example, if a coffee shop chain has 10 different locations then each of the 10 different location will be assigned a unique venue ID. Alternatively, a single venue ID may be assigned to each of the different locations. Column 1321 shows all of the promotional codes used in each of the records in the table. A promotional code may be comprised of a number, alpha-numeric number, letter, word, or symbol that helps identify the type of transaction. For example, a promotional code of 1 defines a transaction where the allotment is determined by the transaction amount. For example, if the promotional code is 1 and the transaction amount is less than $5.99 (the transaction threshold) then the allotment remaining will be set to 15 minutes giving the user of a particular AC 15 minutes of access. If the transaction amount had been greater than $5.99 but less than $9.99 then the allotment remaining will be set to 30 minutes giving the user of a particular AC 30 minutes of access. Column 1323 shows all of the transaction amounts used in each of the records in the table. The transaction amount may be comprised as the actual dollar amount spent in a commercial transaction, a number or alpha-numeric number related to the amount spent in a commercial transaction, or a letter, word, or symbol related to the amount spent in a commercial transaction, frequent flyer miles, number of watts used in a power grid, minutes in a wireless cellular network or any number, alpha-numeric number, letter, word, or symbol that relates to something of value. The tax in a commercial transaction may or may not be included in the transaction amount. For example if a customer at a coffee shop purchases a cup of coffee for $4.99 then the transaction amount will be stored in the database table as $4.99 in column 1323. Column 1325 shows all of the transaction dates in each of the records in the table. The transaction date may be comprised as the actual date the commercial transaction occurred, a number related to the actual commercial transaction date such as the julian date, or may be an alpha-numeric number, letter, word, or symbol related to the actual commercial transaction date. Column 1327 shows all of the transaction times in each of the records in the table. The transaction time may be comprised as the actual time the commercial transaction occurred. The transaction time may be expressed with a 12 hour clock, a 24 hour clock, or a number related to the actual time the commercial transaction occurred. Column 1329 shows all of the allotments allocated in each of the records in the table. The allotment allocated may be comprised as a number, alpha-numeric number, letter, word or symbol that describes an amount of access allocated to an AC. For example, an allotment allocated may be the number of minutes of access time. Or, an allotment allocated may be the number of mega bytes allowed to download or upload or both to a network. Column 1331 shows all of the allotments remaining in each of the records in the table. The allotment remaining may be comprised as a number, alpha-numeric number, letter, word or symbol that describes an amount of access remaining to an AC. For example, an allotment remaining may be the number of minutes of access time left in a users session. Or, an allotment remaining may be the number of mega bytes remaining to download or upload or both to a network. It should be noticed to those skilled in the art that
Column 1429 shows all of the venue IDs for each of the records in the table in
As can be seen by those of skill in the art the tables in
The MAC address comprises the identification of the Network Interface Card (“NIC”) of the either the access point 1119 or the optional proxy server 1123. In a multiple venue embodiment, such as that in
The plurality of user devices 1013, 1015, 1017 may connect to the access point 1021 via communications link 1019. As discussed previously the user devices 1013, 1015, 1017 can be laptop computers, PDAs, Wi-Fi® phones, cellular phones, mobile handsets, other portable devices, or other computer based devices. Although
The database 1045 is similar to database 617.
The communication links 1019 and 1035 are similar to communication links 629 and 119 will not be discussed again. Communication links 1043, 1047, and 1051 are similar to communication link 633 and will not be discussed again. Communication links 1025 and 1041 are similar to communication links 621, and 117 and will not be discussed again.
The methods for controlling network access in a multiple venue configuration as in
According to
The cash register 623 in
The database tables for the airline ticketing embodiment are similar to the tables depicted in
The plurality of user devices 1111, 1113, 1115 are similar to the user devices 611, 613, 615. A discussion of user devices 1111, 1113, 1115 will not be repeated here. The optional proxy server 1123 is similar to proxy server 625 and a discussion will not be repeated. The database 1117 is similar to database 617 and a discussion will not be repeated. The cash register 1121 is similar to the cash register 623 and a discussion will not be repeated.
The IVR 1125 is a computer system that delivers pre-programmed audio messages from an audio response unit (“ARU”) either built into the IVR or separate. The IVR 1125 is also capable of receiving DTMF tones or data from user devices. Examples of IVR units include IVR products from BCE Elix, Cisco IP IVR, Apex, and Aspect. The IVR unit in the instant invention is used to deliver an audio message asking a user to enter an access code. The IVR will receive the access code and either process it according to the algorithms discussed previously or send the AC to the access point 1119 or optionally to the proxy server 1123 where the access point 1119 or optionally the proxy server 1123 will process according to the algorithms discussed previously. Additionally, the IVR 1125 may also inform the user how many minutes are left until the expiration of the AC.
The communication link 1129 is similar to communication links 119, 629, 1019 and 1035 and will not be discussed again. Communication links 1137 is similar to communication links 621, 1025, and 1041 and will not be discussed again. Communication link 1135 is similar to communication links 633, 1043, 1047, and 1051 and will not be discussed again.
Although
It should be noted that the words used in this specification to describe the instant embodiments are to be understood not only in the sense of their commonly defined meanings, but to include by special definition in this specification: structure, material or acts beyond the scope of the commonly defined meanings. Thus if an element can be understood in the context of this specification as including more than one meaning, then its use must be understood as being generic to all possible meanings supported by the specification and by the word or words describing the element.
In addition, the definitions of the words or drawing elements described herein are meant to include not only the combination of elements which are literally set forth, but all equivalent structure, material or acts for performing substantially the same function in substantially the same way to obtain substantially the same result. In this sense it is therefore contemplated that an equivalent substitution of two or more elements may be made for any one of the elements described and its various embodiments or that a single element may be substituted for two or more elements in a claim.
Changes from the claimed subject matter as viewed by a person with ordinary skill in the art, now known or later devised, are expressly contemplated as being equivalents within the scope intended and its various embodiments. Therefore, obvious substitutions now or later known to one with ordinary skill in the art are defined to be within the scope of the defined elements. This disclosure is thus meant to be understood to include what is specifically illustrated and described above, what is conceptually equivalent, what can be obviously substituted, and also what incorporates the ideas herein.
Claims
1. A method of providing access to a network, comprising:
- using a cash register to provide an access code for network access for use by a user device, the access code being provided in association with a transaction for goods or services other than access to the network;
- receiving the access code from the user device; and
- allowing the user device to access the network.
2. The method of claim 1 further comprising determining if the access code received from the user device is proper.
3. The method of claim 2 wherein determining if the access code received from the user device is proper comprises determining if the access code is a valid access code.
4. The method of claim 1 further comprising determining an indication of whether the user device is within a venue in which the cash register is located.
5. The method of claim 1 wherein an access allotment is associated with the access code.
6. The method of claim 5 further comprising disallowing access to the network by the user device after utilization of the access allotment.
7. The method of claim 5 wherein the access allotment is a time duration.
8. The method of claim 7 further comprising disallowing access to the network by the user device at the end of the time duration.
9. The method of claim 5 wherein the access allotment is a byte allotment.
10. The method of claim 1 wherein using the cash register to provide the access code for network access comprises:
- requesting the access code;
- receiving the access code; and
- providing the access code.
11. The method of claim 10 wherein requesting the access code comprises transmitting a request from the cash register to a device configured to provide access codes.
12. The method of claim 11 wherein receiving the access code comprises receiving the access code by the cash register from the device configured to provide access codes.
13. The method of claim 11 wherein the device configured to provide access codes is an access point.
14. The method of claim 10 wherein providing the access code comprises printing the access code.
15. The method of claim 14 wherein printing the access code comprises printing the access code on a receipt for the transaction for goods or services other than access to the network.
16. A method of providing access to a network, comprising:
- receiving payment from a customer for a good or service other than provision of network access;
- providing the customer a receipt for payment for the good and an access code for use in wirelessly accessing a network;
- receiving the access code from a device associated with the customer;
- validating the access code; and
- allowing the device to access the network if the access code is valid.
17. The method of claim 16 wherein the receipt includes the access code.
18. The method of claim 16 further comprising determining the access code.
19. The method of claim 18 wherein determining the access code comprises retrieving the access code from a memory.
20. The method of claim 18 wherein determining the access code comprises calculating the access code.
21. The method of claim 18 wherein determining the access code comprises retrieving the access code from a database.
22. The method of claim 18 wherein determines the access cite comprises retrieving the access code from a RADIUS server.
23. A method for providing usage of a wide area network (WAN) to a customer of a commercial establishment through a proxy server, the method comprising:
- setting a WAN access time duration according to a commercial transaction between the customer and the commercial establishment for a good or service other than WAN access time;
- providing transaction information to the customer including a user access code; and
- establishing data communication between a customer data processing device positioned in the physical area about the commercial establishment and the WAN through the access point using the user access code.
24. A system for providing controlled access to a network, comprising:
- an access point configured for wireless communication with a plurality of user devices, configured for data communication with a network, and configured to allow specific ones of the plurality of user devices to be in data communication with the network based upon receipt of an access code from the specific ones of the plurality of user devices; and
- a cash register configured to provide receipts for commercial transactions, the commercial transactions for goods or services other than network access, and configured to provide access codes.
25. The system of claim 24 further comprising a database storing the access codes.
26. The system of claim 25 wherein the database is part of the cash register, and the cash register is data coupled to the access point.
27. The system of claim 25 wherein the database is part of the access point, and the access point is data coupled to the cash register.
28. The system of claim 25 wherein the database is part of a computer device in data communication with the access point, and the access point is data coupled to the cash register.
29. A method of providing network access to a Wi-Fi enabled phone, comprising:
- using a cash register to provide an access code for network access for use by a Wi-Fi enabled phone, the access code being provided in association with a transaction for goods or services other than access to the network;
- receiving the access code from the Wi-Fi enabled phone; and
- allowing the Wi-Fi enabled phone access to the network.
Type: Application
Filed: May 15, 2007
Publication Date: Nov 20, 2008
Inventor: Jon Eastman (Beverly Hills, CA)
Application Number: 11/749,107
International Classification: G06F 17/00 (20060101);